Issue | Title | |
Vol 9, No 6 (2022) | Reliable and Scalable Broadcast Scheme for Safety Applications in Vehicular Ad Hoc Network | Abstract PDF |
Mehul Vala, Vishal Vora | ||
Vol 10, No 2 (2023) | Reliable Network Formation Using New Approach of Daemon Service Installation in Handheld Devices for Post-Disaster Search and Rescue | Abstract PDF |
Vipin Kumar Pandey, Suddhasil De | ||
Vol 11, No 1 (2024) | Resilient Artificial Bee Colony Optimized AODV Routing Protocol (RABCO-AODV-RP) for Minimizing the Energy Consumption in Flying Ad-Hoc Network | Abstract PDF |
S. Nandhini, K. S. Jeen Marseline | ||
Vol 10, No 1 (2023) | Resilient Consensus-Based Time Synchronization with Distributed Sybil Attack Detection Strategy for Wireless Sensor Networks: A Graph Theoretic Approach | Abstract PDF |
Suresh Kumar Jha, Anil Gupta, Niranjan Panigrahi | ||
Vol 10, No 2 (2023) | Resource Provisioning and Utilization in 5G Network Slicing: A Survey of Recent Advances, Challenges, and Open Issues | Abstract PDF |
Simon Atuah Asakipaam, Jerry John Kponyo, Kwame Oteng Gyasi | ||
Vol 5, No 6 (2018) | Rethinking Audience Clustering in Sports Market using Gossip Protocol | Abstract PDF |
Asif Ali Banka, Roohie Naaz | ||
Vol 9, No 2 (2022) | RMBSRA: Routing Manager Based Secure Route Analysis Mechanism for Achieving Secure Routing Protocol in IOT MANET | Abstract PDF |
P. T. Kasthuri Bai | ||
Vol 7, No 5 (2020) | Robust Resource Scheduling With Optimized Load Balancing Using Grasshopper Behavior Empowered Intuitionistic Fuzzy Clustering in Cloud Paradigm | Abstract PDF |
G. Kiruthiga, S. Mary Vennila | ||
Vol 10, No 3 (2023) | Robust Tristate Security Mechanism to Protect Against Selective Forwarding Attack and Black Hole Attack in Intra-Cluster Multi-Hop Communication | Abstract PDF |
A. Anitha, S. Mythili | ||
Vol 9, No 6 (2022) | Scalable and Robust Intrusion Detection System to Secure the IoT Environments using Software Defined Networks (SDN) Enabled Architecture | Abstract PDF |
Tahani M. Alshammari, Faeiz M. Alserhani | ||
Vol 10, No 1 (2023) | Scheduling Framework for Resource Management in IoT Ecosystem Over 5G Network | Abstract PDF |
Gauri S. Rapate, N C Naveen | ||
Vol 5, No 3 (2018) | Secure and Fast Handovers Authentication Methods for Wi-Fi Based Networks:A Review Perspective | Abstract PDF |
Tahadray Jean Tsitaitse, Yongquan Cai, Shaldon Leparan Suntu, Muhammad Nafees Ulfat Khan | ||
Vol 8, No 2 (2021) | Secure Multi-Path Routing Using Splitting and Merging Based Clustering for Reducing Power Usage in MANET | Abstract PDF |
Krishnaveni Sakkarapani, C. Chandra Prabha | ||
Vol 10, No 6 (2023) | Secure Power Aware Hybrid Routing Strategy for Large-Scale Wireless Sensor Networks | Abstract PDF |
Mohammad Sirajuddin, B. Sateesh Kumar | ||
Vol 10, No 1 (2023) | Secure Storage and Data Sharing Scheme Using Private Blockchain-Based HDFS Data Storage for Cloud Computing | Abstract PDF |
Gaurav Shrivastava, Sachin Patel | ||
Vol 8, No 5 (2021) | Securing Service Discovery from Denial of Service Attack in Mobile Ad Hoc Network (MANET) | Abstract PDF |
Smitha Kurian, Loganathan Ramasamy | ||
Vol 2, No 4 (2015) | Security and Fraud Issues of E-Banking | Abstract PDF |
Emad Abu-Shanab, Salam Matalqa | ||
Vol 9, No 1 (2022) | Security Challenges and Related Solutions in Software Defined Networks: A Survey | Abstract PDF |
Konda Srikar Goud, Srinivasa Rao Gidituri | ||
Vol 2, No 2 (2015) | Security Concerns at Various Levels of Cloud Computing Paradigm: A Review | Abstract PDF |
Aarti Singh, Manisha Malhotra | ||
Vol 2, No 2 (2015) | Security Enhancement in Shoulder Surfing Attacks using Passpoints for Random Similar Images (PRSIm) | Abstract PDF |
A. Meiappane, V. Prasanna Venkataesan, V. Premanand | ||
Vol 10, No 1 (2023) | Security Model to Mitigate Black Hole Attack on Internet of Battlefield Things (IoBT) Using Trust and K-Means Clustering Algorithm | Abstract PDF |
P. Rutravigneshwaran, G. Anitha | ||
Vol 3, No 5 (2016) | Self-Correcting Localization Scheme for Vehicle to Vehicle Communication | Abstract PDF |
Salah Abdel Mageid | ||
Vol 11, No 3 (2024) | SOAVMP: Multi-Objective Virtual Machine Placement in Cloud Computing Based on the Seagull Optimization Algorithm | Abstract |
Aristide Ndayikengurukiye, Rim Doukha, Eric Niyukuri, Eric Muheto, Abderrahmane Ez-zahout, Fouzia Omary | ||
Vol 9, No 4 (2022) | Solitude Adaptable User Profile Matching for Mobile Social Cloud Networks | Abstract PDF |
M. Gobi | ||
Vol 8, No 4 (2021) | Source Location Privacy for Geographical Routing in Wireless Sensor Networks: SLPGR | Abstract PDF |
Manjunath D R, Anil Kumar B | ||
276 - 300 of 333 Items | First Previous 7 8 9 10 11 12 13 14 Next Last |
Browse Title Index
Scroll